Understanding and Mitigating Remote File Inclusion VulnerabilitiesIntroductionJun 18, 2024Jun 18, 2024
Compiler Remote Code ExecutionRemote code execution is a vulnerability where an attacker is able to inject malicious code to the application server . Also an attacker…Jun 5, 2024Jun 5, 2024
Understanding CSRF Vulnerability: Introduction, Exploitation, and MitigationCross-Site Request Forgery (CSRF) is a type of web security vulnerability that allows an attacker to induce users to perform actions on a…May 29, 2024May 29, 2024
Exploiting Path traversal vulnerabilityIn this section, we’ll talk about path traversal vulnerabilities and how to spot and exploit the weak points. We’ll also explore how to…Mar 13, 2024Mar 13, 2024
CSRF (Full Account takeover) YandexIn this blog post i will be sharing one of my old finding where i was able to takeover any user account by tricking victim do unwanted…Jul 18, 2023Jul 18, 2023
How i was able to remove your noteWhile i was testing one of the private program i was able to delete any user note in the API request by changing the id parameter of the…Jun 13, 2023Jun 13, 2023
(Blind)SQL injection Login Bypass ChallengeHello community this write up will be about how i managed to bypass the challenge of sql-injection with the help of SQLMAP . Currently i…Jul 26, 20211Jul 26, 20211
Lack of rate limit leading to account take overHello community this is my second write up. In this write up I am going to share one of the critical bugs which allows me to take over any…May 13, 2021May 13, 2021